128 results on '"Di Crescenzo A"'
Search Results
2. On Single-Server Delegation of RSA
3. L’engagement au travail : panorama des études psychosociales
4. A Survey on Delegated Computation
5. LA ATENCIÓN A LAS ALTAS CAPACIDADES
6. Encrypted-Input Obfuscation of Image Classifiers
7. Secure and Efficient Delegation of Pairings with Online Inputs
8. Some Results on a Growth Model Governed by a Fractional Differential Equation
9. Secure and Efficient Delegation of Elliptic-Curve Pairing
10. Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols
11. Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory
12. Cryptographic Formula Obfuscation
13. Cryptographic Password Obfuscation
14. Applications of the Quantile-Based Probabilistic Mean Value Theorem to Distorted Distributions
15. Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups
16. Giacometti and the Kauffmann tomb
17. Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks
18. Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols
19. Efficient Computations over Encrypted Data Blocks
20. Foundations of Optical Encryption: A Candidate Short-Key Scheme
21. Fractional Growth Process with Two Kinds of Jumps
22. Efficient and Secure Delegation of Group Exponentiation to a Single Server
23. Privacy-Preserving Range Queries from Keyword Queries
24. On Minimizing the Size of Encrypted Databases
25. Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model
26. Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database
27. On the Geometric Brownian Motion with Alternating Trend
28. Practical and Privacy-Preserving Policy Compliance for Outsourced Data
29. Efficient and Private Three-Party Publish/Subscribe
30. Some Results on Brownian Motion Perturbed by Alternating Jumps in Biological Modeling
31. Stochastic Comparisons of Cumulative Entropies
32. Multimodal Treatment of Constipation: Surgery, Rehabilitation or Both?
33. Data Forensics Constructions from Cryptographic Hashing and Coding
34. Neuronal Data Analysis Based on the Empirical Cumulative Entropy
35. On the damped geometric telegrapher’s process
36. Zero-Knowledge Proofs via Polynomial Representations
37. Combinatorial Group Testing for Corruption Localizing Hashing
38. A Neuronal Model with Excitatory and Inhibitory Inputs Governed by a Birth-Death Process
39. Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model
40. On the Statistical Dependency of Identity Theft on Demographics
41. Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy
42. On Cumulative Entropies and Lifetime Estimations
43. Social Network Privacy via Evolving Access Control
44. Corruption-Localizing Hashing
45. Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model
46. Succinct NP Proofs from an Extractability Assumption
47. 3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge
48. On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
49. Random Motion with Gamma-Distributed Alternating Velocities in Biological Modeling
50. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.